August 1981 | Technical Report TR-81-79
A Critique of Some Public-Key Cryptosystems
Cite This Publication
William J. Hartman, “A Critique of Some Public-Key Cryptosystems,” Technical Report TR-81-79, U.S. Department of Commerce, National Telecommunications and Information Administration, Institute for Telecommunication Sciences, August 1981.
William J. Hartman
Abstract: Several of the public-key cryptosystems that received considerable publicity are examined. The uses, implementation, and potential cryptoanalytic attacks are discussed. Since most of the suggested systems depend on the manipulation of large numbers, special multi precision computer programs have been developed to demonstrate system implementation and cryptoanalytic attacks. Examples of the use and timing of these programs are included.
Keywords: Public-key; number theory; cryptology; algorithms
Disclaimer: Certain commercial equipment, components, and software may be identified in this report to specify adequately the technical aspects of the reported results. In no case does such identification imply recommendation or endorsement by the National Telecommunications and Information Administration, nor does it imply that the equipment or software identified is necessarily the best available for the particular application or uses.
For questions or information on this or any other NTIA scientific publication, contact the ITS Publications Office at ITSinfo@ntia.gov or 303-497-3572.